Search alternatives:
vector » sector (Expand Search)
processes » process (Expand Search)
Showing 4,241 - 4,260 results of 4,440 for search 'Vector processes', query time: 0.11s Refine Results
  1. 4241

    Integrating Quantitative Analyses of Historical and Contemporary Apparel with Educational Applications by Zlatina Kazlacheva, Daniela Orozova, Nadezhda Angelova, Elena Zurleva, Julieta Ilieva, Zlatin Zlatev

    Published 2025-02-01
    “…The most informative of the shape and color indices of contemporary and historical clothing were selected using the RReliefF, FSRNCA, and SFCPP methods. The feature vectors were reduced using the latent variable and t-SNE methods. …”
    Get full text
    Article
  2. 4242

    Regulation of microtubule nucleation in glioblastoma cells by ARF GTPase-activating proteins GIT1 and GIT2 and protein kinase C by Vadym Sulimenko, Eduarda Dráberová, Vladimíra Sládková, Tetyana Sulimenko, Věra Vosecká, Omar Skalli, Pavel Dráber

    Published 2025-04-01
    “…To further investigate their role in microtubule modulation, we examined the function of GITs in microtubule nucleation and the involvement of protein kinase C (PKC) in this process. Methods Glioblastoma cell lines with depleted GIT protein levels were generated using shRNA lentiviral vectors. …”
    Get full text
    Article
  3. 4243

    DeepAT: A Deep Learning Wheat Phenotype Prediction Model Based on Genotype Data by Jiale Li, Zikang He, Guomin Zhou, Shen Yan, Jianhua Zhang

    Published 2024-11-01
    “…This method can predict wheat yield based on genotype data and has innovations in the following four aspects: (1) The data feature extraction layer of DeepAT can extract representative feature vectors from high-dimensional SNP data. By introducing the ReLU activation function, it enhances the model’s ability to express nonlinear features and accelerates the model’s convergence speed; (2) DeepAT can handle high-dimensional and complex genotype data while retaining as much useful information as possible; (3) The feature relationship capture layer of DeepAT effectively captures the complex relationships between features from low-dimensional features through a self-attention mechanism; (4) Compared to traditional RNN structures, the model training process is more efficient and stable. …”
    Get full text
    Article
  4. 4244

    Research on anti-occlusion tracking method for underground mine personnel based on adaptive link optimization by LU Yang, DONG Lihong, YE Ou

    Published 2025-02-01
    “…After compression and fusion processing of the trajectory pair input vectors, a trajectory similarity score was output by the multilayer perceptron. …”
    Get full text
    Article
  5. 4245

    Conceptual and categorical apparatus of the state criminal and legal policy of countering cybercrimes by S.V. Korzun

    Published 2025-03-01
    “…Having analyzed the scientific achievements of previous years, we have come to an understanding of the concepts of «cybercrime», «cybercrime» through the prism of multi-vectority, using various approaches, including considering international and national legislation. …”
    Get full text
    Article
  6. 4246

    Investigating the effects of Gaussian noise on epileptic seizure detection: The role of spectral flatness, bandwidth, and entropy by Nuri Ikizler, Gunes Ekim

    Published 2025-04-01
    “…Feature vectors are generated for both original signals and signals with varying levels of injected Gaussian noise. …”
    Get full text
    Article
  7. 4247

    Spectral Clustering-Guided News Environments Perception for Fake News Detection by Kun Wang, Yuzhen Yang, Xiaoyang Wang

    Published 2024-01-01
    “…We first leverage the graph theory-based spectral clustering approach to obtain the center-of-mass vectors and entropies to capture the complex associations and implicit evidences among the news on social media. …”
    Get full text
    Article
  8. 4248

    The Main Areas of Cooperation between Russia and Kazakhstan in the Framework of Eurasian Integration by L. Gusev

    Published 2015-03-01
    “…It is noted that Kazakhstan stands firmly behind its recess, but this process is accompanied by development of other «vectors» of foreign policy (particularly in China and the Asia-Pacific region, the West and the Islamic states). …”
    Get full text
    Article
  9. 4249

    Sustained and Efficient Delivery of Antivascular Endothelial Growth Factor by the Adeno-associated Virus for the Treatment of Corneal Neovascularization: An Outlook for Its Clinica... by Mengzhen Xie, Lixiang Wang, Yingping Deng, Ke Ma, Hongbo Yin, Xiaolan Zhang, Xingye Xiang, Jing Tang

    Published 2024-01-01
    “…This review comprehensively examines the necessity, benefits, and risks of applying AAV vectors for anti-VEGF drug delivery in corneal vascularization, including its current progress and challenges in clinical translation.…”
    Get full text
    Article
  10. 4250

    FPGA Implementation for GMM-Based Speaker Identification by Phaklen EhKan, Timothy Allen, Steven F. Quigley

    Published 2011-01-01
    “…These differences can be exploited by extracting feature vectors such as Mel-Frequency Cepstral Coefficients (MFCCs) from the speech signal. …”
    Get full text
    Article
  11. 4251

    Regional “sociology without sociologists” in the Middle Volga Region in the Soviet Period by M. V. Kildeev

    Published 2022-12-01
    “…Burawoy to determine the vectors of evolution of Soviet and Russian regional sociology. …”
    Get full text
    Article
  12. 4252

    Enhancing credit card fraud detection: highly imbalanced data case by Dalia Breskuvienė, Gintautas Dzemyda

    Published 2024-12-01
    “…The uniqueness of the proposed method is in forming a new dataset containing the Best-Matching Units of the trained SOM as vectors of attributes corresponding to the initial features. …”
    Get full text
    Article
  13. 4253

    Russian-Kazakhstan Relations: Problems and Prospects by Leonid Yuryevich Gusev, Andrey Anatolyevich Kazantsev

    Published 2018-04-01
    “…It is noted that Kazakhstan stands firmly behind its recess, but this process is accompanied by development of other “vectors” of foreign policy (particularly in China and the Asia-Pacific region, the West and the Islamic states). …”
    Get full text
    Article
  14. 4254

    Q-Gen: A Parameterized Quantum Circuit Generator by Yikai Mao, Shaswot Shresthamali, Masaaki Kondo

    Published 2025-01-01
    “…In the full quantum computing workflow, most data processing remains in the classical domain except for running the quantum circuit in the quantum processor. …”
    Get full text
    Article
  15. 4255

    The impact of conversational AI on consumer decision-making: A systematic review and cluster analysis by David Lopez-Lopez, Marc Bara Iniesta

    Published 2025-06-01
    “…This study presents a comprehensive analysis of the influence of conversational artificial intelligence (AI)—a subset of AI that enables machines to simulate human-like conversations through natural language processing (NLP)—on consumer decision-making within the digital marketing landscape. …”
    Get full text
    Article
  16. 4256

    Evaluating solar power plant sites using integrated GIS and MCDM methods: a case study in Kermanshah Province by Iman Zandi, Aynaz Lotfata

    Published 2025-01-01
    “…It introduces a novel group weighting method, the Dempster-based Best-Worst Method (DBWM), which combines weights vectors derived from experts’ opinions. The study also conducts a comprehensive sensitivity analysis comparing four GIS-based models for SPPSS. …”
    Get full text
    Article
  17. 4257

    Three-Dimensional Trajectory Tracking Control for Stratospheric Airship Based on Deep Reinforcement Learning by Xixiang Yang, Fangchao Bai, Xiaowei Yang, Yuelong Pan

    Published 2025-01-01
    “…According to the discrete state and action space, a Markov decision process model for the three-dimensional trajectory tracking control problem was established. …”
    Get full text
    Article
  18. 4258

    Sylph: An Unsupervised APT Detection System Based on the Provenance Graph by Kaida Jiang, Zihan Gao, Siyu Zhang, Futai Zou

    Published 2025-07-01
    “…Sylph proposes a whole-process architecture from provenance graph collection to anomaly detection, starting from the system audit logs, and dividing subgraphs based on time slices of the provenance graph it transforms into to reduce memory overhead. …”
    Get full text
    Article
  19. 4259

    The Global Element Method for Three- Dimensional Potential Problems by Xinrong Li, Chao Zhang, Yaoming Zhang

    Published 2025-01-01
    “…Conventional methods typically require discretizing the boundary into numerous local elements to approximate boundary functions, whereas the GEM adopts a novel strategy: it selects the largest possible portion of the boundary as the integration element, thereby avoiding the cumbersome discretization process. The core advantage of this method lies in the fact that the formation of the influence matrix depends solely on the normal and position vectors, eliminating the need for explicit interpolation approximation of boundary quantities or numerical integration, making it a true boundary node method. …”
    Get full text
    Article
  20. 4260

    Architectural Gaps in Generative AI: Quantifying Cognitive Risks for Safety Applications by He Wen, Pingfan Hu

    Published 2025-06-01
    “…<b>Background</b>: The rapid integration of generative AIs, such as ChatGPT, into industrial, process, and construction management introduces both operational advantages and emerging cognitive risks. …”
    Get full text
    Article